Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yun, Ji-Hoon | - |
dc.contributor.author | Park, Min-Ho | - |
dc.date.available | 2018-05-09T13:58:27Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2013-10 | - |
dc.identifier.issn | 0929-6212 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/11150 | - |
dc.description.abstract | There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a representative example of relaying attack, in which a pair of attacker nodes relay received packets to each other and selectively drop them. The wormhole attack is known to ruin routing and communication of a network considerably, however, is not very straightforward to be accomplished due to the pairwise nature. In this paper, we introduce two new types of relaying attack, called teleport and filtering attacks that require a single attacker node only for accomplishment. We describe their accomplishment conditions and impacts on the network performance in a formal manner. We then propose a countermeasure framework against these attacks called Single-Adversary Relaying Attack defense Mechanism (SARAM), which is composed of a bandwidth-efficient neighbor discovery customized for multi-hop environments and neighbor list management combined into an on-demand ad hoc routing protocol. SARAM does not require any special hardware such as location-aware equipments and tight synchronized clocks, thus is cost-efficient as well. We show via ns-2 simulation that the new relaying attacks deteriorate the network performance significantly and SARAM is effective and efficient in defending a network against these attacks. | - |
dc.publisher | SPRINGER | - |
dc.relation.isPartOf | WIRELESS PERSONAL COMMUNICATIONS | - |
dc.subject | WORMHOLE ATTACKS | - |
dc.title | Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/s11277-013-1163-3 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | WIRELESS PERSONAL COMMUNICATIONS, v.72, no.4, pp.2519 - 2532 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000325023700040 | - |
dc.identifier.scopusid | 2-s2.0-84885469950 | - |
dc.citation.endPage | 2532 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 2519 | - |
dc.citation.title | WIRELESS PERSONAL COMMUNICATIONS | - |
dc.citation.volume | 72 | - |
dc.contributor.affiliatedAuthor | Park, Min-Ho | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Wireless ad hoc network | - |
dc.subject.keywordAuthor | Wormhole attack | - |
dc.subject.keywordAuthor | Relaying attack | - |
dc.subject.keywordPlus | WORMHOLE ATTACKS | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.